Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 19:49

General

  • Target

    277df6b7e2b08e4d801692aa6182ecbb56d2e7d5701d4ee455f554f9b606bd5f.exe

  • Size

    186KB

  • MD5

    b0548f54355655069f0732456444b214

  • SHA1

    709f89fbb2385faeb6a196f104bb2ed1c2ff0dbd

  • SHA256

    277df6b7e2b08e4d801692aa6182ecbb56d2e7d5701d4ee455f554f9b606bd5f

  • SHA512

    378f3e5b199ddf9224ce45d471196c7f305774ebd35b8d2c772decbafee5b0468de70c37e1c2ba92059fec877b03ac71b7890c5319d53b58b24aa18c3dfd2fce

  • SSDEEP

    3072:fnyiQSo1EZGtKgZGtK/PgtU1wAIuZAIuXwFwtdQixiw76y:KiQSo1EZGtKgZGtK/CAIuZAIulr

Score
9/10

Malware Config

Signatures

  • Renames multiple (3437) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\277df6b7e2b08e4d801692aa6182ecbb56d2e7d5701d4ee455f554f9b606bd5f.exe
    "C:\Users\Admin\AppData\Local\Temp\277df6b7e2b08e4d801692aa6182ecbb56d2e7d5701d4ee455f554f9b606bd5f.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2164

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    186KB

    MD5

    b5a732ccce929200b243f72f8b60f54e

    SHA1

    5d725352e027f1ecb9bcf31dffbdb460e2a0d2cd

    SHA256

    2658cce28bf9afb889d327fa72f5207aa07117ffb03dab9c658a891825b0e041

    SHA512

    6da964170ca17a322dbba8e512121e81fc6037e6d36afdc90a80ec6c004f0a5375181cf4b3e1f7869c66e949bde5bf6e9ef6e25cb9a88ad45b6f59cb81e536f6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    195KB

    MD5

    09e8e11e440fbc2c0a9a22fc656a239b

    SHA1

    1685a1aaa9a553b6a9aabf84735ae02c909dbef5

    SHA256

    7b02f167b63ee52859d3fa42e5e94a66f1e230eada84519ae0d8e353be9a0892

    SHA512

    ed6da8f42156070024bb28592603d0cc73a03ed42b497268de8f48ac870b693c0fdeddb665ce025636aa357e8b9a5833a6c764a2f7e85e556d0c334e7a913817

  • memory/2164-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2164-644-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB